亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? nt新bug,遠(yuǎn)程dos攻擊.txt

?? 當(dāng)今
?? TXT
字號(hào):
發(fā)信人: Suning (蘇寧★軍刀出鞘★), 信區(qū): Security 

標(biāo)  題: NT新BUG,遠(yuǎn)程DoS攻擊 

發(fā)信站: 武漢白云黃鶴站 (Sun Oct 17 04:37:01 1999), 轉(zhuǎn)信 

  

ISS X-Force 發(fā)現(xiàn)一項(xiàng)針對(duì) Windows NT Server 4.0 終端伺服器版本所作的 DoS 

攻擊。這個(gè)安全性弱點(diǎn)讓遠(yuǎn)端使用者可以迅速的耗盡 Windows NT Terminal 

Server 上所有可用的記憶體,造成主機(jī)上所有登入者斷線,并且無法再度登入。 

-- 說明 

1. Windows NT Server 4.0 終端伺服器版本在 TCP port 3389 監(jiān)聽終端連接 

(terminal connection),一旦某個(gè) TCP 連接連上這個(gè) port, 終端伺服器會(huì)開 

始分配系統(tǒng)資源,以處理新的客戶端連接,并作連接的認(rèn)證工作。 

2. 此處的漏洞在於:在認(rèn)證工作完成前,系統(tǒng)需要撥出相當(dāng)多的資源去處理新的連 

接,而系統(tǒng)并未針對(duì)分配出去的資源作節(jié)制。因此遠(yuǎn)端的攻擊者可以利用建立大 

量 TCP 連接到 port 3389 的方法,造成系統(tǒng)記憶體配置達(dá)到飽和。 

3. 此時(shí)伺服器上所有使用者連接都會(huì)處於 time out 狀態(tài),而無法繼續(xù)連接到伺服 

器上,遠(yuǎn)端攻擊者仍能利用一個(gè)僅耗用低頻寬的程式,做出持續(xù)性的攻擊,讓此 

伺服器處於最多記憶體被耗用的狀態(tài),來避免新的連接繼續(xù)產(chǎn)生。 

4. 在國外的測試報(bào)告中指出,長期持續(xù)不斷針對(duì)此項(xiàng)弱點(diǎn)的攻擊,甚至可以導(dǎo)致伺 

服器持續(xù)性當(dāng)機(jī),除非重新開機(jī),伺服器將無法再允許新連接的完成。 

-- 影響平臺(tái) 

Windows NT 4.0 Terminal Server Edition. 

-- 修正方式 

1. 以下是修正程式的網(wǎng)址: 

ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40tse/hotfixes 

- - -postSP4/Flood-fix/ 

[注意]:因?yàn)樾袛?shù)限制,上面網(wǎng)址請(qǐng)合并為一行。 

2. 更詳細(xì)資料請(qǐng)參考 Microsoft 網(wǎng)站的網(wǎng)址: 

http://www.microsoft.com/security/bulletins/ms99-028.asp. 

-- 影響結(jié)果----------------------------------------------------------- 

使用者可以造成 DoS 攻擊, 被 伺服器功能。 

-- 連絡(luò) TW-CERT------------------------------------------------------- 

電話 : 886-7-5250211 傳真 : 886-7-5250212 

Email : twcert@cert.org.tw 

URL : http://www.cert.org.tw/ 

PGP key: 

-----BEGIN PGP PUBLIC KEY BLOCK----- 

Version: 2.6.3ia 

mQCNAzZAFDsAAAEEANzLoQSm04piwvHUzIDDKNUx0wlDkIVNL8Be4W7Yxs5NKXjT 

SRByjr7qthvBGdK76SjoJjZWQSXqhUFcqq2o0Sd+wOSTlJnQVCNQVtL/6qUI2akQ 

MM/SneDbXaR1v8ylITj7KObIUhDUXihHB4l5W1LDesL+0w0qP0v2HGG3WSotAAUR 

sAGHtAZUd0NlcnSwAQM= 

=nvFF 

-----END PGP PUBLIC KEY BLOCK----- 

====================================================================== 

附件 : [ISS Security Advisory: Denial of Service Attack Against Windows NT 

Terminal Server] 

-----BEGIN PGP SIGNED MESSAGE----- 

ISS Security Advisory 

August 9, 1999 

Denial of Service Attack Against Windows NT Terminal Server 

Synopsis: 

The ISS X-Force has discovered a denial of service attack against 

Windows NT Server 4.0, Terminal Server Edition. This vulnerability 

allows a remote attacker to quickly consume all available memory on a 

Windows NT Terminal Server, causing a significant disruption for users 

currently logged into the terminal server, and preventing any new terminal 

connections from being successfully completed. 

Recommended Action: 

Network administrators can protect internal systems from external attack 

by creating a packet filter of the form: 

- Prevent all incoming packets destined for TCP port 3389 

If you have a legitimate need for terminal server connections to be made 

>from outside your network, you should limit access to TCP port 3389 to 

only the external IP addresses or networks that have a legitimate reason 

to connect. 

The fix for this problem is available at 

ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40tse/hotfixes 

- - -postSP4/Flood-fix/ 

The Microsoft bulletin describing this issue is available at 

http://www.microsoft.com/security/bulletins/ms99-028.asp. 

Description: 

Windows NT Server 4.0 Terminal Server Edition listens for terminal 

connections on TCP port 3389. Once a TCP connection is made to this port, 

the terminal server will utilize resources in order to handle the new 

client connection and authenticate the connection. The manner this is 

done, however, requires significant server resources before any 

authentication takes place and without any throttling of resource 

utilization. 

Specifically, a remote attacker can quickly cause a server to reach full 

memory utilization by creating a large number of normal TCP connections 

to port 3389. Individual connections will timeout, but a low bandwidth 

continuous attack will maintain a terminal server at maximum memory 

utilization and prevent new connections from a legitimate source 

>from taking place. Legitimate new connections will fail at this point 

with an error of either a connection timeout, or the terminal server has 

ended the connection. 

In testing, a long running attack of this type has been able to 

sporadically crash the terminal server executable and permanently maintain 

the machine at full memory usage without allowing any new terminal server 

connections until the machine was rebooted. 

Additional Information: 

This vulnerability was primarily researched by David J. Meltzer of the ISS 

X-Force. 

________ 

About ISS: 

ISS leads the market as the source for e-business risk management solutions, 

serving as a trusted security provider to thousands of organizations 

including 21 of the 25 largest U.S. commercial banks and more than 35 

government agencies. With its Adaptive Security Management approach, ISS 

empowers organizations to measure and manage enterprise security risks 

within Intranet, extranet and electronic commerce environments. Its 

award-winning SAFEsuite(r) product line of intrusion detection, 

vulnerability management and decision support solutions are vital for 

protection in today's world of global connectivity, enabling organizations 

to proactively monitor, detect and respond to security risks. Founded in 

1994, ISS is headquartered in Atlanta, GA with additional offices 

throughout the U.S. and international operations in Australia/New Zealand, 

Belgium, France, Germany, Japan, Latin America and the UK. For more 

information, visit the ISS Web site at www.iss.net or call 800-776-2362. 

Copyright (c) 1999 by Internet Security Systems, Inc. Permission is 

hereby granted for the redistribution of this Alert electronically. It is 

not to be edited in any way without express consent of the X-Force. If 

you wish to reprint the whole or any part of this Alert in any other 

medium excluding electronic medium, please e-mail xforce@iss.net 

forpermission. 

Disclaimer 

The information within this paper may change without notice. Use of this 

information constitutes acceptance for use in an AS IS condition. There 

are NO warranties with regard to this information. In no event shall the 

author be liable for any damages whatsoever arising out of or in 

connection with the use or spread of this information. Any use of this 

information is at the user's own risk. 

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php3 as 

well as on MIT's PGP key server and PGP.com's key server. 

Please send suggestions, updates, and comments to: X-Force xforce@iss.net 

of Internet Security Systems, Inc. 

-----BEGIN PGP SIGNATURE----- 

Version: 2.6.3a 

Charset: noconv 

iQCVAwUBN67ziDRfJiV99eG9AQFDggP+N4t+n/UhAxGiBRJDGxjFeJSgfbjbDMd7 

m6BVFhe4RSDsmLbKoHnK+8J9bM5RoiWMiY6pMe2YUcfQfRySwz3nfmnzpxXjoUmv 

Tv7aWiSvqcc6OVHS7/7tKMzxL49g/6PFPUVqRDhkKrrWbdhTW9uKejn77OfY9l2r 



8ckrqQ4k3l4= 

=4Kwx 

-----END PGP SIGNATURE----- 

====================================================================== 

本文由綠色兵團(tuán)成員原創(chuàng),如要轉(zhuǎn)載請(qǐng)保持文章的完整性 

  

-- 

    心事浩茫連廣宇,于無聲處聽驚雷 

  

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区三区精品在线观看| 丝袜脚交一区二区| 欧美一区二区视频在线观看2022| 国产伦精品一区二区三区视频青涩| 悠悠色在线精品| 国产欧美日本一区二区三区| 91麻豆精品久久久久蜜臀| 成人午夜伦理影院| 蜜臀av性久久久久蜜臀av麻豆| 亚洲女女做受ⅹxx高潮| 久久综合成人精品亚洲另类欧美 | 欧美精品777| av在线这里只有精品| 麻豆视频一区二区| 亚洲午夜在线电影| 国产精品福利av| 久久久亚洲精品石原莉奈| 欧美精品免费视频| 色久综合一二码| av亚洲精华国产精华| 国产伦精品一区二区三区视频青涩| 午夜av一区二区| 亚洲日本在线看| 国产精品―色哟哟| 久久理论电影网| 日韩精品一区二区三区老鸭窝| 欧美日韩一区小说| 日本高清视频一区二区| 91香蕉视频污| 不卡一区二区中文字幕| 成人永久免费视频| 福利视频网站一区二区三区| 久久精品国产久精国产爱| 日本中文字幕一区二区有限公司| 亚洲一区在线播放| 亚洲制服欧美中文字幕中文字幕| 日韩美女视频一区| 亚洲六月丁香色婷婷综合久久| 国产精品乱人伦中文| 国产精品美女久久久久久久| 国产精品网站在线观看| 欧美国产综合色视频| 欧美国产欧美综合| 亚洲国产精品精华液2区45| 久久久不卡网国产精品一区| 国产婷婷色一区二区三区四区| 国产丝袜欧美中文另类| 亚洲国产成人在线| 亚洲三级在线看| 亚洲综合自拍偷拍| 亚洲小说春色综合另类电影| 亚洲一区二区美女| 日韩精品免费视频人成| 久久精品国产久精国产爱| 国产乱淫av一区二区三区| 国产精品996| 99热这里都是精品| 色猫猫国产区一区二在线视频| 欧美最猛黑人xxxxx猛交| 欧美日韩精品电影| 日韩精品一区二区三区中文精品| wwwwxxxxx欧美| 国产精品久久久久影院色老大 | 精品国产91乱码一区二区三区 | 亚洲桃色在线一区| 亚洲一区二区三区小说| 日本不卡一区二区三区| 久久99精品国产| 成人激情av网| 欧美色大人视频| 日韩欧美一级特黄在线播放| 日本一区二区三区免费乱视频| 国产精品成人在线观看| 午夜不卡av在线| 国产乱一区二区| 91国偷自产一区二区使用方法| 欧美剧情片在线观看| 精品人在线二区三区| 国产精品家庭影院| 轻轻草成人在线| 成人精品亚洲人成在线| 欧美午夜精品一区二区三区| 日韩女优电影在线观看| 国产日产精品一区| 亚洲国产cao| 国产美女娇喘av呻吟久久| 在线视频一区二区三| 欧美精品一区二区三区在线播放 | 麻豆视频观看网址久久| 成人国产精品免费观看视频| 欧美精品亚洲二区| 中文字幕视频一区| 奇米精品一区二区三区在线观看 | xnxx国产精品| 亚洲午夜视频在线| 国产不卡视频在线播放| 6080国产精品一区二区| 日韩理论片在线| 九色综合狠狠综合久久| 精品视频资源站| 成人欧美一区二区三区小说 | 日韩专区一卡二卡| 成人高清视频在线观看| 日韩美女视频在线| 亚洲午夜免费视频| 97久久久精品综合88久久| 日韩免费成人网| 五月天久久比比资源色| 91老师片黄在线观看| 日韩欧美123| 日韩精品电影在线观看| 91久久精品一区二区| 中文久久乱码一区二区| 黑人精品欧美一区二区蜜桃| 欧美浪妇xxxx高跟鞋交| 一区二区三区在线免费播放| 国产丶欧美丶日本不卡视频| 欧美一级片在线| 亚洲成av人影院在线观看网| 欧美最猛性xxxxx直播| 自拍偷拍亚洲欧美日韩| 成人午夜看片网址| 久久夜色精品国产噜噜av| 麻豆精品一区二区综合av| 欧美妇女性影城| 亚洲国产一区二区a毛片| 色综合久久99| 亚洲精选在线视频| 日本乱人伦一区| 亚洲色图20p| 色先锋久久av资源部| 亚洲人成精品久久久久久| av亚洲精华国产精华精华| 国产精品乱码一区二三区小蝌蚪| 国产福利一区在线| 国产日韩在线不卡| 国产91精品入口| 国产日韩av一区| 成人污视频在线观看| 日本一区二区三级电影在线观看 | 亚洲第一主播视频| 欧美日韩五月天| 午夜精品一区在线观看| 欧美精选一区二区| 日本视频中文字幕一区二区三区| 欧美性一二三区| 天天综合色天天| 精品日产卡一卡二卡麻豆| 国产一区免费电影| 国产精品国模大尺度视频| av一区二区三区黑人| 一区二区理论电影在线观看| 欧美系列一区二区| 日本不卡高清视频| 久久综合色一综合色88| 丁香婷婷综合色啪| 中文字幕中文字幕在线一区| 91免费视频网址| 性欧美疯狂xxxxbbbb| 精品久久久久久久久久久院品网| 国产成人午夜视频| 亚洲日本在线天堂| 69久久夜色精品国产69蝌蚪网| 麻豆精品精品国产自在97香蕉| 久久精品一二三| 91毛片在线观看| 日本欧美一区二区三区| 久久精品在线观看| 欧美在线观看视频在线| 日韩av中文在线观看| 久久精品欧美一区二区三区不卡 | 国产精品国产三级国产有无不卡| 色哟哟欧美精品| 蜜桃久久久久久久| 国产精品视频看| 欧美精品 日韩| 成年人网站91| 青青青爽久久午夜综合久久午夜| 日本一区二区视频在线| 在线免费亚洲电影| 国产成人免费视频一区| 亚洲成人中文在线| 国产精品嫩草久久久久| 666欧美在线视频| 91在线视频在线| 国产在线国偷精品产拍免费yy| 亚洲综合精品自拍| 国产日本欧美一区二区| 欧美精品vⅰdeose4hd| av电影天堂一区二区在线| 日本亚洲天堂网| 亚洲一区欧美一区| 国产精品丝袜久久久久久app| 91精品中文字幕一区二区三区 | 精品久久久久久久人人人人传媒 | 亚洲成人精品在线观看| 国产精品美女久久久久av爽李琼| 欧美一级在线免费| 欧美日韩专区在线| 99久久精品99国产精品|